An Attribute-Based Encryption Scheme to Secure Fog Communications

被引:96
作者
Alrawais, Arwa [1 ,2 ]
Alhothaily, Abdulrahman [1 ,3 ]
Hu, Chunqiang [1 ,4 ]
Xing, Xiaoshuang [5 ]
Cheng, Xiuzhen [1 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[3] Saudi Arabian Monetary Author, Gen Dept Payment Syst, Riyadh 11169, Saudi Arabia
[4] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[5] Changshu Inst Technol, Sch Comp Sci & Engn, Changshu 215500, Peoples R China
基金
中国国家自然科学基金;
关键词
Fog computing; security; ciphertext-policy attribute based encryption (CP-ABE); cloud computing; communications security;
D O I
10.1109/ACCESS.2017.2705076
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since fog computing originates from and is a non-trivial extension of cloud computing, it inherits many security and privacy challenges of cloud computing, causing the extensive concerns in the research community. To enable authentic and confidential communications among a group of fog nodes, in this paper, we propose an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants. To achieve confidentiality, authentication, verifiability, and access control, we combine CP-ABE and digital signature techniques. We analyze the efficiency of our protocol in terms of security and performance. We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility.
引用
收藏
页码:9131 / 9138
页数:8
相关论文
共 22 条
[1]   Energy Management-as-a-Service Over Fog Computing Platform [J].
Al Faruque, Mohammad Abdullah ;
Vatanparvar, Korosh .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02) :161-169
[2]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[3]  
[Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
[4]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[5]  
[Anonymous], CCS07 P 14 ACM C
[6]  
[Anonymous], 2012, P 7 ACM S INFORM COM
[7]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[8]  
Cao Y, 2015, PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), P2, DOI 10.1109/NAS.2015.7255196
[9]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[10]  
Dijiang Huang, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P614, DOI 10.1109/INFCOMW.2011.5928886